-
1
-
-
84886723209
-
A survey on security issues and solutions at different layers of cloud computing
-
C. Modi et al., "A Survey on Security Issues and Solutions at Different Layers of Cloud Computing," J. Supercomputing, vol. 63, no. 2, 2013, pp. 561-592.
-
(2013)
J. Supercomputing
, vol.63
, Issue.2
, pp. 561-592
-
-
Modi, C.1
-
2
-
-
79956118096
-
Seamless integration of dependability and security concepts in soa: A feedback control system based framework and taxonomy
-
J. Hu et al., "Seamless Integration of Dependability and Security Concepts in SOA: A Feedback Control System Based Framework and Taxonomy," J. Network and Computer Applications, vol. 34, no. 4, 2011, pp. 1150-1159.
-
(2011)
J. Network and Computer Applications
, vol.34
, Issue.4
, pp. 1150-1159
-
-
Hu, J.1
-
3
-
-
84887090951
-
Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection
-
Y. Meng, W. Li, and L.-F. Kwok, "Towards Adaptive Character Frequency-Based Exclusive Signature Matching Scheme and Its Applications in Distributed Intrusion Detection," Computer Networks, vol. 57, no. 17, 2013, pp. 3630-3640.
-
(2013)
Computer Networks
, vol.57
, Issue.17
, pp. 3630-3640
-
-
Meng, Y.1
Li, W.2
Kwok, L.-F.3
-
4
-
-
84897137099
-
A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns
-
G. Creech and J. Hu, "A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns," IEEE Trans. Computers, vol. 63, no. 4, 2014, pp. 807-819.
-
(2014)
IEEE Trans. Computers
, vol.63
, Issue.4
, pp. 807-819
-
-
Creech, G.1
Hu, J.2
-
5
-
-
84891816613
-
A system for denial-of-service attack detection based on multivariate correlation analysis
-
Z. Tan et al., "A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis," IEEE Trans. Parallel and Distributed Systems, vol. 25, no. 2, 2014, pp. 447-456.
-
(2014)
IEEE Trans. Parallel and Distributed Systems
, vol.25
, Issue.2
, pp. 447-456
-
-
Tan, Z.1
-
7
-
-
84870661024
-
Secure cloud computing based on mutual intrusion detection system
-
S. Ram, "Secure Cloud Computing Based on Mutual Intrusion Detection System," Int'l J. Computer Application, vol. 2, no. 1, 2012, pp. 57-67.
-
(2012)
Int'l J. Computer Application
, vol.2
, Issue.1
, pp. 57-67
-
-
Ram, S.1
-
8
-
-
84903436399
-
Intrusion detection system in cloud computing environment
-
S.N. Dhage and B. Meshram, "Intrusion Detection System in Cloud Computing Environment," Int'l J. Cloud Computing, vol. 1, no. 2, 2012, pp. 261-282.
-
(2012)
Int'l J. Cloud Computing
, vol.1
, Issue.2
, pp. 261-282
-
-
Dhage, S.N.1
Meshram, B.2
-
9
-
-
84890428705
-
Data summarization for network traffic monitoring
-
Jan.
-
D. Hoplaros, Z. Tari, and I. Khalil, "Data Summarization for Network Traffic Monitoring," J. Network and Computer Applications, vol. 37, Jan. 2014, pp. 194-205.
-
(2014)
J. Network and Computer Applications
, vol.37
, pp. 194-205
-
-
Hoplaros, D.1
Tari, Z.2
Khalil, I.3
-
10
-
-
84870667876
-
An intrusion detection and prevention system in cloud computing: A systematic review
-
A. Patel et al., "An Intrusion Detection and Prevention System in Cloud Computing: A Systematic Review," J. Network and Computer Applications, vol. 36, no. 1, 2013, pp. 25-41.
-
(2013)
J. Network and Computer Applications
, vol.36
, Issue.1
, pp. 25-41
-
-
Patel, A.1
-
11
-
-
0010818929
-
-
tech. report, Dept. of Computer Science, Univ. of Virginia
-
A.K. Jones and R.S. Sielken, Computer System Intrusion Detection: A Survey, tech. report, Dept. of Computer Science, Univ. of Virginia, 2000; http://atlas.cs.virginia.edu/jones/IDS-research/ Documents/jones-sielken-survey-v11.pdf.
-
(2000)
Computer System Intrusion Detection: A Survey
-
-
Jones, A.K.1
Sielken, R.S.2
-
13
-
-
37549003336
-
Map reduce: Simplified data processing on large clusters
-
J. Dean and S. Ghemawat, "MapReduce: Simplified Data Processing on Large Clusters," Comm. ACM, vol. 51, no. 1, 2008, pp. 107-113.
-
(2008)
Comm. ACM
, vol.51
, Issue.1
, pp. 107-113
-
-
Dean, J.1
Ghemawat, S.2
-
14
-
-
78649318959
-
A mutual-healing key distribution scheme in wireless sensor networks
-
B. Tian et al., "A Mutual-Healing Key Distribution Scheme in Wireless Sensor Networks," J. Network and Computer Applications, vol. 34, no. 1, 2011, pp. 80-88.
-
(2011)
J. Network and Computer Applications
, vol.34
, Issue.1
, pp. 80-88
-
-
Tian, B.1
-
15
-
-
79953833858
-
Self-healing key distribution schemes for wireless networks: A survey
-
B. Tian et al., "Self-Healing Key Distribution Schemes for Wireless Networks: A Survey," Computer J., vol. 54, no. 4, 2011, pp. 549-569.
-
(2011)
Computer J.
, vol.54
, Issue.4
, pp. 549-569
-
-
Tian, B.1
|